Home About us Contact | |||
User Profile (user + profile)
Selected AbstractsImprovement of information filtering by independent components selectionELECTRICAL ENGINEERING IN JAPAN, Issue 2 2008Takeru Yokoi Abstract We propose an improvement of an information filtering process with independent components selection. The independent components are obtained by Independent Components Analysis and considered as topics. Selection of independent components is an efficient method of improving the accuracy of the information filtering for the purpose of extraction of similar topics by focusing on their meanings. To achieve this, we select the topics by Maximum Distance Algorithm with Jensen-Shannon divergence. In addition, document vectors are represented by the selected topics. We create a user profile from transformed data with a relevance feedback. Finally, we sort documents by the user profile and evaluate the accuracy by imputation precision. We carried out an evaluation experiment to confirm the validity of the proposed method considering meanings of components used in this experiment. © 2008 Wiley Periodicals, Inc. Electr Eng Jpn, 163(2): 49,56, 2008; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/eej.20519 [source] Pre-handover signalling for QoS aware mobility managementINTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, Issue 6 2004Hakima Chaouchi In this paper we present a new approach to provide fast handover in Mobile IP. A new Pre-Handover Signalling (PHS) protocol is proposed to allow the network to achieve accurate handover decisions considering different constraints such as QoS, load balancing in the base stations, the user profile, the mobile node service requirements, etc. In addition we propose to minimize the time discovery of the new base station in order to minimize the handover latency. We propose to start the PHS as soon as the mobile node crosses a predefined critical zone area in its current location, this signalling will provide a list of candidate cells to the mobile node with corresponding priorities; the mobile node will select the highest priority base station as soon as the layer two handover occurs. We propose in the current work to use an extension of COPS (Common Open Policy Service) to support the proposed PHS mechanism and overcome the blind handover decisions of Mobile IP and improve the handover performance.,Copyright © 2004 John Wiley & Sons, Ltd. [source] Multivariate Bayesian regression applied to the problem of network securityJOURNAL OF FORECASTING, Issue 8 2002Kostas Triantafyllopoulos Abstract An Erratum has been published for this article in Journal of Forecasting 23(6): 461 (2004). This paper examines the problem of intrusion in computer systems that causes major breaches or allows unauthorized information manipulation. A new intrusion-detection system using Bayesian multivariate regression is proposed to predict such unauthorized invasions before they occur and to take further action. We develop and use a multivariate dynamic linear model based on a unique approach leaving the unknown observational variance matrix distribution unspecified. The result is simultaneous forecasting free of the Wishart limitations that is proved faster and more reliable. Our proposed system uses software agent technology. The distributed software agent environment places an agent in each of the computer system workstations. The agent environment creates a user profile for each user. Every user has his or her profile monitored by the agent system and according to our statistical model prediction is possible. Implementation aspects are discussed using real data and an assessment of the model is provided. Copyright © 2002 John Wiley & Sons, Ltd. [source] User profiling on the Web based on deep knowledge and sequential questioningEXPERT SYSTEMS, Issue 1 2006Silvano Mussi Abstract: User profiling on the Web is a topic that has attracted a great number of technological approaches and applications. In most user profiling approaches the website learns profiles from data implicitly acquired from user behaviours, i.e. observing the behaviours of users with a statistically significant number of accesses. This paper presents an alternative approach. In this approach the website explicitly acquires data from users, user interests are represented in a Bayesian network, and user profiles are enriched and refined over time. The profile enrichment is achieved through a sequential asking algorithm based on the value-of-information theory using the Shannon entropy concept. However, what mostly characterizes the approach is the fact that the user is involved in a collaborative process of profile building. The approach has been tried out for over a year in a real application. On the basis of the experimental results the approach turns out to be particularly suitable for applications where the website is strongly based on deep domain knowledge (as for example is the case for scientific websites) and has a community of users that share the same domain knowledge of the website and produce a ,low' number of accesses (,low' compared to the high number of accesses of a typical commercial website). After presenting the technical aspects of the approach, we discuss the underlying ideas in the light of the experimental results and the literature on human,computer interaction and user profiling. [source] Mobile user profiles for Personal Networks: The MAGNET Beyond caseINTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, Issue 9-10 2010Ch. Z. Patrikakis Abstract In this paper, a methodology for the definition and application of profiles for mobile devices is presented. The methodology, following the recommendations of ETSI, is used to present the definition of profiles capable of supporting Personal Networking capabilities. Furthermore, a case study for the development of a socializing service (,Icebreaker') is also presented. The service has just passed the early evaluation phase and proceeds to final implementation. To conclude with, this paper showcases several user interfaces already developed, as also some of their preliminary evaluation results obtained through the Wizard-of-Oz (WoZ) technique. The ideas described here constitute part of the work performed in the context of the European IST FP6 project MAGNET Beyond. Copyright © 2010 John Wiley & Sons, Ltd. [source] Relational mountain (density) clustering method and web log analysisINTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, Issue 3 2005Kuhu Pal The mountain clustering method and the subtractive clustering method are useful methods for finding cluster centers based on local density in object data. These methods have been extended to shell clustering. In this article, we propose a relational mountain clustering method (RMCM), which produces a set of (proto) typical objects as well as a crisp partition of the objects generating the relation, using a new concept that we call relational density. We exemplify RMCM by clustering several relational data sets that come from object data. Finally, RMCM is applied to web log analysis, where it produces useful user profiles from web log data. © 2005 Wiley Periodicals, Inc. Int J Int Syst 20: 375,392, 2005. [source] A metagenetic algorithm for information filtering and collection from the World Wide WebEXPERT SYSTEMS, Issue 2 2001Z.N. Zacharis This paper describes the implementation of evolutionary techniques for information filtering and collection from the World Wide Web. We consider the problem of building intelligent agents to facilitate a person's search for information on the Web. An intelligent agent has been developed that uses a metagenetic algorithm in order to collect and recommend Web pages that will be interesting to the user. The user's feedback on the agent's recommendations drives the learning process to adapt the user's profile with his/her interests. The software agent utilizes the metagenetic algorithm to explore the search space of user interests. Experimental results are presented in order to demonstrate the suitability of the metagenetic algorithm's approach on the Web. [source] |